2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC) 2017
DOI: 10.1109/ccwc.2017.7868478
|View full text |Cite
|
Sign up to set email alerts
|

Virtualized Network Functions security attacks and vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 6 publications
0
21
0
Order By: Relevance
“…The second issue came from the resource sharing for a physical machine. If a virtual machine is attacked, the attacker may attack another virtual machine on the same host and also attacks the physical machine [3,11]. Some virtual servers may have low-security protection.…”
Section: Increasing Of Internet Users Not Only Brings Innovationmentioning
confidence: 99%
See 4 more Smart Citations
“…The second issue came from the resource sharing for a physical machine. If a virtual machine is attacked, the attacker may attack another virtual machine on the same host and also attacks the physical machine [3,11]. Some virtual servers may have low-security protection.…”
Section: Increasing Of Internet Users Not Only Brings Innovationmentioning
confidence: 99%
“…Users do not want to share resources with other users that have low-security protection [12]. The third security issue in virtualization is that some attacks such as DoS attack may disable a link between two physical machines [3,10,11]. Hence, the security management of the virtualized server is important.…”
Section: Increasing Of Internet Users Not Only Brings Innovationmentioning
confidence: 99%
See 3 more Smart Citations